Anion assisted supramolecular self-assemblies of succinate and malate adducts: crystal structures and theoretical modelling R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ... RSC advances 6 (72), 68468-68484, 2016 | 16 | 2016 |
An improved fast and secure hash algorithm S Agarwal, A Rungta, R Padmavathy, M Shankar, N Rajan Journal of Information Processing Systems 8 (1), 119-132, 2012 | 15 | 2012 |
Discrete logarithm problem using index calculus method R Padmavathy, C Bhagvati Mathematical and computer modelling 55 (1-2), 161-169, 2012 | 12 | 2012 |
Methods to solve discrete logarithm problem for ephemeral keys R Padmavathy, C Bhagvati 2009 International Conference on Advances in Recent Technologies in …, 2009 | 8 | 2009 |
Improved three party EKE protocol R Padmavathy Information Technology and control 39 (3), 2010 | 6 | 2010 |
Crystal structure, DFT study, hirshfeld surface and PIXEL energy calculations of benzimidazolium and hexadecylaminium hydrogen maleate salts R Padmavathy, N Karthikeyan, D Sathya, R Jagan, RM Kumar, ... Journal of Molecular Structure 1136, 144-156, 2017 | 5 | 2017 |
A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol. R Padmavathy, C Bhagvati J. Comput. 6 (4), 805-811, 2011 | 5 | 2011 |
A Key Recovery Attack on Chang-Chang Password Key Exchange Protocol R Padmavathy, C Bhagvati Computer And Network Technology, 176-181, 2010 | 5 | 2010 |
Cryptanalysis on a Three Party Key Exchange Protocol-STPKE' S Tallapally, R Padmavathy Journal of Information processing systems 6 (1), 43-52, 2010 | 4 | 2010 |
Improved analysis on Chang and Chang Password Key Exchange Protocol R Padmavathy, T Shirisha, M Rajkumar, J Gyani 2009 International Conference on Advances in Computing, Control, and …, 2009 | 4 | 2009 |
An authenticated keyword searchable conditional proxy re-encryption scheme in cloud services A Swarnakar, CJ Babu, R Padmavathy, R Kumar 2020 5th International Conference on Computing, Communication and Security …, 2020 | 3 | 2020 |
Reversible data hiding using prior pixel pairs in two-dimensional histogram with tri-directional modification of difference histogram A Pinapati, R Padmavathy IETE Technical Review, 2018 | 3 | 2018 |
N—H⋯ O, O—H⋯ O hydrogen-bonded supramolecular sheet formation in the bis (2-aminoanilinium) fumarate, 3-methylanilinium hydrogen fumarate and 4-chloroanilinium hydrogen … D Sathya, R Jagan, R Padmavathy, RM Kumar, K Sivakumar Acta Crystallographica Section C: Crystal Structure Communications 69 (8 …, 2013 | 3 | 2013 |
Block Lanczos to Solve Integer Factorization Problem Using GPU’s H Malla, V SantKaustubh, R Ganesh Advances in Computer Science and Information Technology. Networks and …, 2012 | 3 | 2012 |
Ephemeral key recovery using index calculus method R Padmavathy, C Bhagvati Journal of Discrete Mathematical Sciences and Cryptography 13 (1), 29-43, 2010 | 3 | 2010 |
A New Method for Computing DLP Based on Extending Smooth Numbers to Finite Field for Ephemeral Key Recovery. R Padmavathy, C Bhagvati Int. J. Netw. Secur. 17 (3), 243-254, 2015 | 2 | 2015 |
Index Calculus Method based on Smooth Numbers of±1 over Zp. R Padmavathy, C Bhagvati Int. J. Netw. Secur. 15 (4), 265-273, 2013 | 2 | 2013 |
Quantum-Secure N2N Authentication Protocol Model for IoT Sensor Networks C Jayanth Babu, R Padmavathy Arabian Journal for Science and Engineering, 1-12, 2023 | 1 | 2023 |
Secured Cloud Communication Using Lightweight Hash Authentication with PUF. R Padmavathy, MN Rajkumar Computer Systems Science & Engineering 43 (1), 2022 | 1 | 2022 |
Linear algebra on parallel structures using wiedemann algorithm to solve discrete logarithm problem KS Spoorthi, R Padmavathy, SK Pal, S Ravi Chandra IETE Journal of Research 68 (4), 2376-2389, 2022 | 1 | 2022 |